Jump to content

Search the Community

Showing results for tags 'encrypt'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Found 8 results

  1. How to Encrypt a PDF on a Mac If you want to encrypt a PDF on a Mac, the easiest method is to use the Preview app. You can use Preview to add a password to your most sensitive PDF documents to keep them secure. Preview is available as a core macOS app, so you’ll find it on any Mac computer. There’s no additional software required—all you need is a PDF document to encrypt and a Mac to encrypt it with. If you’d prefer to use other software, you can password-protect PDFs using Microsoft Office instead, but Preview offers the quickest way to do it using a core Mac app. To add a password to a PDF document on macOS, open the Preview app from the Launchpad, which you can launch from the Dock at the bottom of your Mac’s display. Alternatively, you can launch Preview from the Applications folder in the Finder app—you’ll also find this as an icon on your Dock. Once Preview is open, click File > Open from the menu bar to open the PDF document you want to encrypt with a password. To begin encrypting the PDF document you’ve opened in Preview, click File > Export from the menu bar. This will bring up various options to export your PDF in different formats, including the option to add a password. If you don’t want to overwrite your existing document, you’ll need to give your new document a name in the “Export As” box. Confirm the save location under the “Where” drop-down menu. To add a password, click the “Encrypt” checkbox in the options menu and then type a secure password in the “Password” and “Verify” boxes immediately underneath. Press the “Save” button to save your encrypted PDF document once you’ve confirmed your settings. Your PDF document will then be exported using the options you’ve selected. Loading the document in Preview after the file has been encrypted will require you to insert a password. Type in the document password in the “Password” box and then press Enter on your keyboard. If the password is correct, this will decrypt the file and open the document. You’ll be able to continue viewing the file until you close it—once closed, you’ll need to re-enter the password to view the file again. Source
  2. How To Use 7-Zip To Encrypt Files If you need strong command line encryption on Linux, look no further than 7zip You have information on your machines that needs to be secure. This could be client data, company secrets, or your own personal information that you don't want viewed by the wrong person. To that end, you'll go to some rather challenging means to protect that information. But what if that task could be made considerably easier? Although some might not think of the command line as the easier option, there are some CLI tools that do make short shrift of a task. Such is the case with 7zip. Although this tool is typically used for zipping and unzipping files, it also includes the ability to encrypt and decrypt those files. I want to walk you through the installation and usage of 7zip for file encryption. I'll be demonstrating on Ubuntu Server, but the tool can be used on most Linux distributions. What you'll need A running Linux distribution A user with sudo privileges Some data to encrypt How to install the 7zip package on Linux distributions Chances are slim your Linux distribution includes the 7zip package. In order to install the package that includes the encryption features, log in to your Linux machine, open a terminal window, and issue the following command: sudo apt-get install p7zip-full -y To install on a different type of distribution, use a similar command as shown above, substituting apt-get for the likes of dnf or zypper. That's all there is to the installation. How to encrypt files with 7zip Let's say you have the file webservers, which contains important information about the web servers in your data center. To encrypt that file with 7zip, issue the command: 7z a -p -mx=9 -mhe -t7z webservers.7z webservers The options used above are: a: Add files to archive -p: Prompt for a password -mx=9: Level of compression (9 being ultra) -mhe: Encrypt file names -t7z: Generate a 7z archive You will be prompted to create a passphrase for the encryption. Once you've done that, the new encrypted file webservers.7z is created. You can also encrypt multiple files. Say you have the files webservers and kubernetes to be encrypted into the file data.7z. The command for this would be: 7z a -p -mx=9 -mhe -t7z data.7z webservers kubernetes the above command would create the encrypted data.7z file, encrypted by the password of your choice. Once you've encrypted the files, you should then delete the originals. Why? Because those original files (in our examples webservers and kubernetes) aren't encrypted. Only the newly created .7z files are encrypted. So delete those files with the command: rm webservers kubernetes How to decrypt files with 7zip Those files wouldn't be of any use to you if you couldn't decrypt them. So how do you do that? We have the files data.7z and webservers.7z. With 7z, file decryption is done like so: 7za e data.7z or 7za e webservers.7z In either instance, you'll be asked for the passphrase you created during the encryption process. If you failed to delete the original files (which you shouldn't neglect to do), 7z will ask if you want to overwrite the existing files--in our examples that would be webservers and kubernetes (Figure A). Figure A Once you've decrypted the file(s), you can then view their contents. And that's the gist of using 7zip to encrypt and decrypt files. For anyone who needs strong command line encryption on Linux, this might well be the ideal choice for you. Source
  3. If a site offers HTTPS, DuckDuckGo's Smarter Encryption will take you there. It's increasingly common for the data that passes between your browser and a website's server to be encrypted with HTTPS, which makes it impossible for outside snoops to read. But you don't get that protection if the URL drops that crucial "S" after HTTP. And while some mechanisms do redirect you to an encrypted version of a site, they often do so only after exposing that initial request. The makers of the privacy-focused search engine DuckDuckGo think there's a better way. Today DuckDuckGo is releasing a feature called Smarter Encryption that combines its existing private search capabilities and tracker blocking service with a new tool to upgrade encryption for more of the sites you visit. It's available on DuckDuckGo's mobile browser for Android and iOS, and through the company's desktop browser extension for Firefox and Chrome. DuckDuckGo is also open sourcing the code behind the feature so other sites and platforms can adopt it as well. First up? Pinterest. "I think people tend to think it’s a less of a problem because a lot of sites automatically redirect you to an encrypted version now, though a lot of sites also still don’t," says Gabriel Weinberg, DuckDuckGo's founder and CEO. "We wanted to give people a more comprehensive privacy solution no matter where the internet takes you." DuckDuckGo isn't the first organization to tackle the HTTP upgrading problem. The Electronic Frontier Foundation's HTTPS Everywhere browser extension and Chromium's HSTS Preload List provide similar functionality. The latter is enabled by default across Chrome, Firefox, Safari, Opera, Edge, and Internet Explorer. These offerings all function basically the same way, working off a list of sites that offer HTTPS versions to upgrade connections before they're established. But DuckDuckGo's tool has one major difference: Rather than populating a list of upgradable sites manually, Smarter Encryption fills it out automatically using the same web crawling smarts built into DuckDuckGo's private search service. No one needs to add and remove entries from the list on their own; whenever the crawler sees that a site supports HTTPS, it records that as the default for all visitors using Smarter Encryption going forward, regardless of what URL they type or link they click. This automatic element makes the list strikingly comprehensive. Compared to other tools, which have fewer than 150,000 sites on their preload lists, Smarter Encryption already works on 12 million sites, making it more likely that you'll reach for the encrypted version of a given site from the start. Weinberg says DuckDuckGo's auto-populating strategy wasn't as easy to build as he first expected, because of the patchwork of encryption implementations on the web. For example, some sites are only set up to encrypt some of their pages. This means that if Smarter Encryption tries to upgrade your connection to that domain, some functionality and pages may break. It took a number of workarounds—including developing visual tests to automatically assess whether a page looked different after adding encryption upgrading—to make it all work without any browsing disruptions. DuckDuckGo launched a beta of the tool in 2018 to test for any issues. And now it's finally ready for prime time. Search engines and social networks are prime platforms for adding encryption upgrades, because they both incorporate huge numbers of links that are crawler or user-generated and may not include "HTTPS." Pinterest itself is fully encrypted, but implemented Smarter Encryption to protect its users as they click links posted on the platform that lead to outside sites. Pinterest says that after incorporating DuckDuckGo's feature, about 80 percent of outbound traffic routes through HTTPS, up from 30 percent before. "DuckDuckGo was the perfect fit for us because they maintain a comprehensive list of upgradable sites, generated by comparing the HTTP and HTTPS version of a site, and adding a site to the HTTPS upgrade list if the two versions are identical," Pinterest explains in a blog post shared with WIRED. "We can then regularly pull and ingest their list." In an early trial deploying the changes to one percent of its users, the social network found that encryption upgrading didn't erode performance. Smarter Encryption will upgrade more and more of your connections over time, to keep as much of your browsing data safe from prying eyes as possible. Theoretically DuckDuckGo might still be able to access those unencrypted requests, which is something to be aware of. But the company has a strong reputation, and Weinberg says that such behavior would violate its privacy policy. There are a lot of privacy holes on the internet that need plugging and gaps in HTTPS is a prime example. Smarter Encryption is one extra protection, at least, that you can largely set and forget. Source
  4. Since there's someone who is looking for tool to protect his exe file, so I just made a thread to help others as well. This tools can pack your exe files, just search on youtube for now of how to use them If I have a time, I'll update this thread. DOWNLOAD LINKS: MoleBoxPro v2.6.5 (2570) [Pre-Activated) Site: https://www.upload.ee Sharecode: /files/9602873/MoleBoxPro_v2.6.5__2570_.rar.html Themida v1.8.5.5 Full Site: http://www.mediafire.com Sharecode: /file/bn8lb33rm28rh17/Themida+v1.8.5.5+Full.rar
  5. Free backup software to store encrypted backups online. Duplicati is a simple-to-use software application designed to take a safety measure when it comes to personal and app files by backing them up to a secure location. It features basic and advanced features alike to please both user groups. Create, schedule and restore backups with personal documents, music, application settings, desktop files and others, save them locally or upload via FTP or an online storage service Features: Duplicati uses AES-256 encryption (or GNU Privacy Guard) to secure all data before it is uploaded. Duplicati uploads a full backup initially and stores smaller, incremental updates afterwards to save bandwidth and storage space. A scheduler keeps backups up-to-date automatically. Encrypted backup files are transferred to targets like FTP, Cloudfiles, WebDAV, SSH (SFTP), Amazon S3 and others. Duplicati allows backups of folders, document types like e.g. documents or images, or custom filter rules. Duplicati is available as application with an easy-to-use user interface and as command line tool. Duplicati can make proper backups of opened or locked files using the Volume Snapshot Service (VSS) under Windows or the Logical Volume Manager (LVM) under Linux. Many Backends Duplicati works with standard protocols like FTP, SSH, WebDAV as well as popular services like Microsoft OneDrive, Amazon Cloud Drive & S3, Google Drive, box.com, Mega, hubiC and many others. Many Features Backup files and folders with strong AES-256 encryption. Save space with incremental backups and data deduplication. Run backups on any machine through the web-based interface or via command line interface. Duplicati has a built-in scheduler and auto-updater. Free Software Duplicati is Free and Open Source. You can use Duplicati for free even for commercial purposes. Source code is licensed under LGPL. Duplicati runs under Windows, Linux, MacOS. It requires .NET 4.5 or Mono. Strong Encryption Duplicati uses strong AES-256 encryption to protect your privacy. You can also use GPG to encrypt your backup. Built for Online Duplicati was designed for online backups from scratch. It is not only data efficient but also handles network issues nicely. E.g. interrupted backups can be resumed and Duplicati tests the content of backups regularly. That way broken backups on corrupt storage systems can be detected before it’s too late. Web-based Interface Duplicati is configured by a web interface that runs in any browser (even mobile) and can be accessed - if you like - from anywhere. This also allows to run Duplicati on headless machines like a NAS (network attached storage). ----- Changelog: - Currently unavailable ----- Homepage: https://www.duplicati.com/ Download 2.0.4.5 Beta: https://github.com/duplicati/duplicati/releases/tag/v2.0.4.5-2.0.4.5_beta_2018-11-28 Download 2.0.4.8 Canary: https://github.com/duplicati/duplicati/releases/tag/v2.0.4.8-2.0.4.8_canary_2018-12-13
  6. Soft Cleaner Safe (License: Free) provides a better file encryption using bit-wise encrypt, multi-tier asynchronous security for the encrypted data. Homepage: http://www.softcleaner.in/soft-cleaner-safe Direct Download: http://www.softcleaner.in/satheeshsoft/ssinstall.exe Direct or indirect password advanced feature. Indirect password belongs to a button 'Same PC'. Once a file encrypted from this 'Same PC', it is impossible to decrypt from any other PC. Password independent security, it means no password store in file/computer/internet or anywhere. The user should remember the password. Even the developer too cannot decrypt the file. The owner is only the user. The security is very tight and tough. The encrypted file data will become a continuous same three to four characters, which are extremely different from the original. The encrypted file length will become original length * 9. It is very fast and accurate. You can encrypt any type of files, 101% secured. Working status Select File Set password up to 11 characters Do Safe Encryption or Safe Decryption During process you can Pause, Resume or Cancel System Requirement Operating System: Windows XP-SP2/SP3, Vista, Windows 7/8/10, 32/64.
  7. r2du-soft

    decrypt and encrypt Eset license.lf

    hi I set up an internal server eset my server can give update from versions 4,5,6,7,8,9,10 and 11.1.42.0 (Antivirus,Smart Security,Internet Security,Smart Security Premium) after 11.1.42.0 eset change the Activation Method and input activation all Sections (computer protection,internet protection,network protection,security tools) in license.lf file in patch: C:\ProgramData\ESET\ESET Security\License now in new versions (11.1.54.0 and 11.2.49.0) i'm somewhat successful in activating. now eset color is green but now i want active all sections (computer protection,internet protection,network protection,security tools) to do this i must make changes to the license.lf file. i know a part of the file is encrypted and when i creation the slightest change in file,license.lf broken! now i need the help for decrypy the license.lf file for change Expire time without broken file! What do you think of this? i put license.lf file in attach to view and test Site: https://www.upload.ee Sharecode: /files/8748211/license.zip.html
  8. Let's Encrypt – a SSL/TLS certificate authority run by the non-profit Internet Security Research Group (ISRG) to programmatically provide websites with free certs for their HTTPS websites – on Thursday said it is discontinuing TLS-SNI validation because it's insecure in the context of many shared hosting providers. TLS-SNI is one of three ways Let's Encrypt's Automatic Certificate Management Environment protocol validates requests for TLS certificates, which enable secure connections when browsing the web, along with the confidence-inspiring display of a lock icon. The other two validation methods, HTTP-01 and DNS-01, are not implicated in this issue. The problem is that TLS-SNI-01 and its planned successor TLS-SNI-02 can be abused under specific circumstances to allow an attacker to obtain HTTPS certificates for websites that he or she does not own. Such a person could, for example, find an orphaned domain name pointed at a hosting service, and use the domain – with an unauthorized certificate to make fake pages appear more credible – without actually owning the domain. For example, a company might have investors.techcorp.com set up and pointed at a cloud-based web host to serve content, but not investor.techcorp.com. An attacker could potentially create an account on said cloud provider, and add a HTTPS server for investor.techcorp.com to that account, allowing the miscreant to masquerade as that business – and with a Let's Encrypt HTTPS cert, too, via TLS-SNI-01, to make it look totally legit. It sounds bonkers but we're told some cloud providers allow this to happen. And that's why Let's Encrypt ditched its TLS-SNI-01 validation processor. Ownership It turns out that many hosting providers do not validate domain ownership. When such providers also host multiple users on the same IP address, as happens on AWS CloudFront and on Heroku, it becomes possible to obtain a Let's Encrypt certificate for someone else's website via the TLS-SNI-01 mechanism. On Tuesday, Frans Rosén, a security researcher for Detectify, identified and reported the issue to Let's Encrypt, and the organization suspended certificate issuance using TLS-SNI-01 validation, pending resolution of the problem. In his account of his proof-of-concept exploit, Rosén recommended three mitigations: disabling TLS-SNI-01; blacklisting .acme.invalid in certificate challenges, which is required to get a cert via TLS-SNI-01; and looking to other forms of validation because TLS-SNI-01 and 02 are broken given current cloud infrastructure practices. AWS CloudFront and Heroku have since tweaked their operations based on Rosén's recommendation, but the problem extends to other hosting providers that serve multiple users from a single IP address without domain ownership validation. Late Thursday, after temporarily reenabling the validation method for certain large hosting providers that aren't vulnerable, Let's Encrypt decided it would permanently disable TLS-SNI-01 and TLS-SNI-02 for new accounts. Those who previously validated using TLS-SNI-01 will be allowed to renew using the same mechanism for a limited time. "We have arrived at the conclusion that we cannot generally re-enable TLS-SNI validation," said ISRG executive director Josh Aas in a forum post. "There are simply too many vulnerable shared hosting and infrastructure services that violate the assumptions behind TLS-SNI validation." Aas stressed that Let's Encrypt will discontinue using the TLS-SNI-01 and TLS-SNI-02 validation methods Article
×
×
  • Create New...